
IGEL benefits from seismic VMware and Windows 10 shifts
No matter how strong IT security is, cyberattacks are almost impossible to prevent. IGEL argues that endpoint...
No matter how strong IT security is, cyberattacks are almost impossible to prevent. IGEL argues that endpoint...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
At its own .conf23 event in Las Vegas, Splunk has announced a new OT product. The Splunk Edge Hub can streaml...
The ransomware gangs LockBit and Clop executed the most ransomware attacks in the month of June this year. Th...
Tens of thousands of Docker Hub container images contain sensitive data such as private keys and API secrets ...
Google Play is going to make uploading malicious apps to its app store more difficult starting Aug. 31. Devel...
The WordPress security plugin All-In-One Security (AIOS) created a security flaw of its own accord. Because o...
Developer platform GitHub now supports passwordless authentication in a public beta form. This allows users t...
Researchers at Black Lotus Labs have tracked down a malware variant that has been flying under the radar for ...
Among Microsoft's cloud computing services are detection tools that could have detected the Chinese email hac...
Cisco is set to acquire Identity Threat Detection and Response (ITDR) startup Oort. Its technology will be ad...
Research team Mandiant has seen that attacks via USB malware have experienced a threefold growth. These attac...